Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
This advanced graduate textbook gives an authoritative and insightful description of the major ideas and techniques of public... [more]
A self-contained and widely accessible text, with almost no prior knowledge of mathematics required, this book presents a... [more]
This book shows the risks and protections cyberspace offers for national security and information warfare. [more]
Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts.... [more]
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource to help you pursue the most recognized,... [more]
Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array of security... [more]
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption... [more]
Most computer users are ignorant of the tracks, trails, and traces they leave behind when they use their computer. This book... [more]
Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing... [more]
Use the same password or PIN for different services...? Keep forgetting your passwords or PINs...? Keep a written record of... [more]
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various... [more]
This book introduces basic concepts and ideas of quantum computing and quantum computational complexity. It discusses almost... [more]
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication... [more]
In its revised fifth edition, this book covers ethical, social and policy challenges arising from the convergence of computing... [more]
The only book to provide a unified view of the interplay between computational number theory and cryptography Computational... [more]
Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and... [more]
This book provides an overview of non-governmental threats to privacy from private businesses and corporations. The authors... [more]
Assessing the strength of block ciphers is critical to public trust, as they ensure the security of internet traffic. This... [more]
Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused... [more]
We cannot make progress with human-to-machine authentication without understanding both humans and machines. Mobile security... [more]
This book constitutes the refereed proceedings of the International Conference Eco-friendly Computing and Communication Systems,... [more]
Opening with a detailed review of techniques for selective encryption, this book examines algorithms that combine encryption... [more]
This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and... [more]
Generic group algorithms solve computational problems defined over algebraic groups without exploiting properties of a particular... [more]
This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks,... [more]